Open to full-time pentesting opportunities & freelance engagements

whoami

Contact: 863-230-3028
Location: Florida, United States
~~~~~~~~~~~~~~~~~~~~~~~~
Hello, and welcome to my website. My name is Ryan.

This site serves as the following:

– My professional & comprehensive resume.
– A public blog of my continuous journey in the cybersecurity field with major focus on Red Team Tactics.
~~~~~~~~~~~~~~~~~~~~~~~~
Tap or click here to see my certifications, experience, & education as a single PDF file

Please use the methods I’ve provided on this site to make initial contact with me.

Blog

Erratic Powershell Command Execution

(I recommend 2X speed when watching.) Command execution errors 10 times (red text appear on the big screen after the end of command execution.) on the 11th execution it the reverse shell completes successfully as seen on little Pi’s screen.

#After discovering my split rev shell scheduled task (dirty drive persistance) was getting blocked by Windows Defender, I tried altering the script many times and got inconclusive results, I came to realize it was working properly after executing the script/commands 11 times. At the time of this note I do not know what causes this and the amount of times it must be executed before it’s allowed through the antivirus differs for different computers (i tested my personal hp laptop and my work lenovo laptop. The lenovo seems to only need 3 or 4 executions, sometimes works 1st time). I do not know if it’s an OS, Powershell, or other software version issue.

 —got this out of my codex, so this is from a few years ago. I need to revisit the mystery…

—text above that starts with a hashtag is from my codex notes.

In the video:

—The little screen is the raspberry pi listening for an inbound connection with ncat. (It’s a reverse shell scenario)

—On the computer using Windows and powershell, the commands for a reverse shell are being injected with a HID keyboard injector and is coded to repeat the same set of actions so I didn’t have to do it manually.

From my codex

The video is a crude insight into what my codex contains.

I keep a private database of code with notes. The information comes from my ongoing research, experiments, practice labs, educational endeavors, and learning outcomes.

Port forward conflict

Context:

Main router network 192.168.1.1/24

2nd router with its own network 192.168.2.1/24

Main router has assigned 192.168.1.100 to the WAN port of the 2nd router.

A system on the 2nd network at 192.168.2.5 needs a few ports forwarded to it from the WAN port (which is connected to the main LAN at 192.168.1.100, and not the public internet).

Issue:

I want to access the web interface of the 2nd network from the main network at its WAN address of 192.168.1.100:80 BUT port 80 is already being forwarded to another system at 192.168.2.5 so the routers web interface port for the WAN cannot be accessed at 192.168.1.100 since it is being told to forward everything going to port 80 on the WAN 192.168.1.100 to port 80 at 192.168.2.5

Solution:

set up a port forward using another port like 8080 on 192.168.1.100 to 192.168.2.1

Now when on the main network 192.168.1.1/24 the 2nd network web interface can be reached by going to 192.168.1.100:8080

Useless automation?

I practice physical computing to reinforce my understanding of computer logic. This project is using a microbit, a relay solenoid, and a valve solenoid. Theres many possibilities and use cases for the project that can be very useful but I myself am generally just interested in getting all of my hardware to talk to each other properly. In this case, Im triggering my shower to start when the front door knob is turned. The video of my project in action is below, followed by the microbit code.

I know, I know – My code is missing documentation. Ill explain how the program works sometime but its not a priority for me right now….

connected demo

Explicit: Please note that themes conveyed through song are for educational and entertainment purposes only.

Panda Express Drive Thru screen

I was just there for the food but what a fun surprise lol.

‘UVNC_SERVICE COULD NOT START’ uh oh…

Will someone please just restart this machine lol.

Rolling Key Code

Practicing some tactics to abuse Rolling Key Code and replay an RF signal to unlock a vehicle. FYI, there is nothing wrong with this vehicles security system or RKC implementation. It use to be that keyfobs would always send the same message to the vehicle -so the button that pops the trunk had its own message, unlock button had its own message and so on for the other buttons. This made them easy to hack with replay attacks of the captured RF signal. Rolling Key Code is the answer to that problem and has been in use on all modern vehicles for quite sometime now. Vehicles from the 90s and before may still be vulnerable to replay attacks though.

So what’s going on in this video then?

The trick to stealing a useable RKC requires that the receiver on the inside of the vehicle MUST NOT “HEAR” the signal, when a button on the key fob is pressed because that’s what’s making the RKC roll. Both the key fob and the receiver in the vehicle have already negotiated the algorithm to be used for creating 1 time use keys.

So, to exploit RKC, one must -capture the signal from a keyfob while preventing the signal from reaching the vehicle. Once the vehicle gets the replayed message from you, the signal will be valid but it’s also a one time use so it’s kind of a one-and-done situation. Also, at anytime the keyfob transmits and the vehicle receives the signal, the RKC just moves ahead based on the last one sent and now the bad actors captured signal from the keyfob is behind in its order of usage making it invalid.

Safe Phishing

Safe social engineering tactics to audit your Workforce. Contact today for a consultation.

Amazon Sidewalk

It has begun, if you own an Amazon device look for Sidewalk Settings in the App and decide whether or not to allow the new feature addition. The quick knowledge on this is Amazon Sidewalk lets your neighbors Sidewalk enabled device use your internet if they experience an internet outtage and vice versa.